Search Results for identity theft

Jawbone still in business–with Fitbit in court

While most industry observers are perceiving Jawbone’s abandoning the consumer fitness tracker market, repositioning into the clinical B2B2C vitals market, and seeking fresh financing as a last-ditch effort to save the company, Jawbone continues to be highly active in one place–court. Last week, Jawbone filed a lawsuit against Fitbit and five former employees in California state court for theft of trade secrets and has rebutted Fitbit’s motion to dismiss in a 27-page filing. According to Fortune’s account of the lawsuit, Jawbone’s filing states: “Each of the defendants has been, for more than five months, the subject of a criminal grand... Continue Reading

What are the impacts of NHS CCGs forcing disabled and LTC patients into care homes? (UK)

...with health conditions into care homes.” CCGs due to NHS cuts have been setting limits on financing home care, between 10 and 40 percent above the care home option. In other words, where a care home is cheaper, the CCG will withdraw payment for home care, and unless the individual can self-pay or has an advocate who can organize a care plan, that person may be involuntarily moved. The word ‘institutionalization’ deservedly strikes fear on both sides of the Atlantic as a recipe for patient decline, physical and verbal abuse, theft and generally bad care. It’s a blunderbuss solution to... Continue Reading

Weekend viewing: NYeC Digital Health Conference presentations

...‘Turning Impossible on Its Head’ on disrupting healthcare with technology: Robert Putrino of Burke Rehabilitation Center on a miracle of 3D printing DSRIP 2017 and readmissions may not sound very interesting, but the presentations by Veyo‘s Josh Komenda on how transportation assistance can also aid compliance, and the discussion on the missing link of population health may be social determinants of health care, are. Wednesday’s ‘Universal Patient Identity’ presentation by Tom Foley of Lenovo Health; a must-see by anyone interested in preventing identity fraud and theft at the provider level “The Patient Room of the Future’ by Joan Saba, partner... Continue Reading

Summertime, and the health data breaches are easy….

...your data be wild, free and shared with others, it also tattles on you to marketers and potential hackers. How Your Health Data Lead A Not-So-Secret Life Online (NPR) But is medical identity theft that big of a deal? ID Experts will scare the hairs off your head over the 140 million Americans with information disclosed in data breaches, exploding through criminal attacks, the 10 deadly sins of healthcare fraud amounting to $272 billion–and actually who owns your PHI, because it may not be you. Start with A Big Deal or Much Ado about Nothing? from this 2015 article series.... Continue Reading

Changing care models to connect better with care, age at home

While this Editor didn’t get to the second annual d.Health Summit in NYC this past May, the organizers Avi Seidmann, PhD & Ray Dorsey, MD [TTA 20 July] of the University of Rochester have conveniently distilled the day down to a 13-page policy paper on successful aging at home. The keynote speaker set the theme around the core needs of older people: identity (“help me stay me”) routine (“help me stay in control”) sociability (“help me stay engaged”) vitality (“help me stay physically and mentally fit”) Innovation around healthcare delivery, mobility solutions, assistive technologies that adjust to a wide variety... Continue Reading

Why do hackers love bitcoin? Blockchain. And why are healthcare, IoT liking blockchain?

...(left above). The Federal ONC-HIT (Office of the National Coordinator for Health Information Technology) under HHS is soliciting up to 15 proposals for “Blockchain and Its Emerging Role in Healthcare and Health-related Research.” through July 29. Cash prizes range from $1,500 to $5,000. The final eight will present at the awards presentation September 26-27. Potential uses are: Medical banking between dis-intermediated parties Distributed EHRs Inventory management Forming a research “commons” and a remunerative model for data sharing Identity verification for insurance purposes An open “bazaar” for services that accommodates transparency in pricing Health Data Management, Information Management, Federal Register announcement... Continue Reading

Data breach cost crests $4 million: Ponemon Institute

...proactive in detecting breaches early, having a CISO (chief information security officer), instituting employee training and awareness programs, deploying encryption and endpoint security plus a business continuity management plan. Ponemon/IBM website. Healthcare IT News Threat hunting is also emphasized in a second Ponemon study sponsored by Raytheon, which recommended offensively hunting down threats to data security, and defensively setting up a security barrier to protect patient data and care systems. With nation-state attacks (think China and Russia), ransomware, compromises due to IoT (add outdated software), and physical data theft, the game is now complete control rather than plain ol’ disruption.... Continue Reading

Nokia’s healthcare repositioning confirmed with Withings $191 million acquisition (updated)

...this confirms that true to the reports, Nokia had been been developing a digital health strategy called WellCare, centered on data and insights collected from wearables. WellCare will now apparently be integrated into Withings. The combination will also be competitive with Apple HealthKit and ResearchKit, which has had extensive takeup by both developers and clinical researchers–but there is plenty of room in the field. Withings retains a strong and uniquely quality design-driven identity, though perhaps not the most well known brand especially in the US, and has a small share in covetable, pricey fitness wearables. But it’s the integration and... Continue Reading

90% of industries have had PHI data breach: Verizon (HIMSS Connected Health)

...author of the PHI Report and an info security/forensics expert, and included in that 90 percent are workers’ compensation programs, self-insured companies, the public sector, financial/insurance companies and–as a damper on this highly competitive (but hard to gauge results) area–wellness programs. Most organizations, according to Ms Widup, aren’t even conscious that they are holding this information and need to specially protect it from intrusion, as “PHI is like gold for today’s cybercriminal.” Consistent with other authoritative tracking studies like Ponemon Institute’s and ID Experts’, the threat is from within: physical theft and loss, insider misuse and ‘miscellaneous’ account for 77... Continue Reading

TECS Project Manager finds Situation Wanted!

...available?’ section (above). It was our pleasure to do so (and also revive this section under Jobs.) Hannah has now written us advising that she has now started a new position with Tunstall Healthcare in their programme delivery team. Congratulations Hannah! And thank you for advising us. And if you are seeking a new situation, or have a position to fill, we are listing–free as a service to our industry. Please write Editor Donna. We will post both confidential and identity revealed contacts. Who’s hiring? mHabitat (UK) Who’s available? Industrial engineer with 20 years experience seeks Silver Economy company (Spain)... Continue Reading